Sunday, March 14, 2010

1Hacker originally meant “one who makes furniture with an ax.” Perhaps because of the blunt nature of that approach, the word came to mean someone who takes pleasure in an unconventional solution to a technical obstacle.

3 One of the club’s early programs: code that illuminated lights on the mainframe’s console, making it look like a ball was zipping from left to right, then right to left with the flip of a switch. Voilà: computer Ping-Pong!

Researchers and engineers who are working in the security field must have strong constitutions—especially when it comes to weathering negative backlash and tired conspiracy theories whenever apple security and Mac OS X are mentioned in the same breath.

The term “virus” is used so often as a generic reference to any malicious code that here at Symantec we tend to use more appropriate blanket terms like "security threat" and “malicious code.” Just how bad is the misuse of the term virus?

Apple security exploits cropped up and have received a lot of attention.

The first vulnerability involved the Leap. Like so many other worms, Leap.A relied on tricking users into downloading and opening a suspicious file. If you ignore file attachments that you don-t expect or that look suspicious, you-ll protect yourself from the vast majority of Internet crud, especially the kind that arrives via e-mail.

Like so many other worms, Leap.A relied on tricking users into downloading and opening a suspicious file. If you ignore file attachments that you don-t expect or that look suspicious, you-ll protect yourself from the vast majority of Internet crud, especially the kind that arrives via e-mail. The worm, known as Inqtana.A, exploited a hole in the Bluetooth software in OS X 10.4 that had been patched last year. Inqtana. Keep your operating system up-to-date and don-t accept unknown files, whether they come to you in e-mail, iChat, or beamed from someone-s Bluetooth phone.

The next one is a vulnerability in Apple-s browser Safari, had the most potential for damage. By default, Safari is set to automatically open "safe" file types, such as movies and music, after they-ve been downloaded. Before Apple closed this hole, malicious scripts could be disguised as an innocuous file type and set to automatically run upon download. Unchecking the "Open -safe- files after downloading" box in Safari-s General Preferences pane also closes the security hole. Browsers other than Safari were not affected.

Hackers who want your passwords and credit-card numbers don-t care whether you-re using a Mac or a PC. Either way, if you use a Wi-Fi network, you-re making their task easier. You should definitely enable whatever encryption your home network supports, be it WEP or WPA. This prevents unauthorized users from hopping onto your network and possibly snooping on your communications and getting into your hard drive.

Sharing Option: Use your firewall to close off access to all the ports that you don-t need open, including file sharing. You might also consider password-protecting or encrypting all or some of your hard drive.

Confidental Documents: If you don-t want someone grabbing your financial data out of the air, save your Internet shopping and banking for your secured home network.

Shoulder-Surfing. Snooping doesn-t always require high-tech gear. As I just mentioned, it-s unwise to work on super-secret company plans in public-but if you must, be aware of what-s going on around you.

Security Updates are also available for software released independently from Mac OS X. For example, Security Update 2005-002 is only available for systems containing the vulnerable version of Java 1.4.2. Software Updates are packaged in a manner to keep systems secure. Security Updates are only offered to systems that need the update, and not to later versions that have incorporated the Security Update.

Here you’ll find all the various used Apple computer models that are currently available, as well as our inventory on Apple computer parts. Here you find how your apple computer safe from virsus and spam.They have offered to systems that need the update, and give the latest versions that have incorporated the Security Update.

The internet is the best place to buy cheap computer parts and take it secure. Due to increase in demand for many parts in many suppliers find it profitable to sell their products online. The online dealers have their websites, which offer information on the various types of Mac parts available for purchase. Go to http://www.Applepart.com, a leading online resource for buying Apple Parts. Applepart.com is the online catalog for Apple Parts ..

XML Web Services are .Net components , which reply to Http requests using the SOAP protocol (Simple Object Access Protocol). XML is one of the principal cornerstones of .Net technology which enables a high degree of interoperability between applications using the Internet. XML Web services are ASP.Net applications which handle requests for .asmx files.

The .asmx extension signals to ASL.Net that it contains non-visual components which are using the XML protocol. These files have a WebService header line which declares it as an XML WebService class. And each method has a WebMethod attribute to make the procedure accessible through the Internet.

When ASP.Net receives an .asmx page, it processes the directives and interprets the query buried within the calling string and produces an .aspx page which derives from the

DefaultWsdlHelpGenerator.aspx stored in the appropriate .Net directory on the server. You can customize that page, but it affects all the applications o f the server. Alternatively, you can change the web.config file to point to a local file to achieve control over the appearance of the page for a specific application.

On the client side, you need to create a Web Service Client which can be either be a Windows form, a Web form, or another Web services application. Don’t forget that the whole process is designed to make the services accessible from any computer running on any platform. This is possible because the actual services are running on the server, which must be running a .Net platform.

XML Web services support 3 protocols: Http GET, Http POST, and SOAP. GET and POST are old technology because they support passing only simple variables – no structures or objects. SOAP protocols support XML objects passed into and back from the server. These SOAP messages are actually XML structures which are passed in an XML envelope with specific requirements, chief among then being the tags methodResponse and methodResult. The grammar and bundling of these messages are handled transparently by .Net XML Services.

We reproduce the structure of the SOAPHttpClientProtocolClass below.Public ConstructorsSoapHttpClientProtocol ConstructorSupported by the .NET Compact Framework. Initializes a new instance of the SoapHttpClientProtocol class.

Public PropertiesAllowAutoRedirect (inherited from HttpWebClientProtocol)Supported by the .NET Compact Framework. Gets or sets whether the client automatically follows server redirects.

ClientCertificates (inherited from HttpWebClientProtocol) Gets the collection of client certificates.ConnectionGroupName (inherited from WebClientProtocol) Gets or sets the name of the connection group for the request.

Container (inherited from Component) Gets the IContainer that contains the Component.CookieContainer (inherited from HttpWebClientProtocol) Gets or sets the collection of cookies.Credentials (inherited from WebClientProtocol)

PreAuthenticate (inherited from WebClientProtocol)Supported by the .NET Compact Framework. Gets or sets whether pre-authentication is enabled.

Proxy (inherited from HttpWebClientProtocol)Supported by the .NET Compact Framework. Gets or sets proxy information for making an XML Web service request through a firewall.

RequestEncoding (inherited from WebClientProtocol)Supported by the .NET Compact Framework. The Encoding used to make the client request to the XML Web service.

Site (inherited from Component) Gets or sets the ISite of the Component.Timeout (inherited from WebClientProtocol)

Supported by the .NET Compact Framework. Indicates the time an XML Web service client waits for a synchronous XML Web service request to complete (in milliseconds).

UnsafeAuthenticatedConnectionSharing (inherited from HttpWebClientProtocol) Gets or sets a value indicating whether connection sharing is enabled when the client uses NTLM authentication to connect to the Web server hosting the XML Web service.

Url (inherited from WebClientProtocol)Supported by the .NET Compact Framework. Gets or sets the base URL of the XML Web service the client is requesting.

UserAgent (inherited from HttpWebClientProtocol)Supported by the .NET Compact Framework. Gets or sets the value for the user agent header that is sent with each request.Public Methods

Abort (inherited from WebClientProtocol)Supported by the .NET Compact Framework. Cancels a request to an XML Web service method.CreateObjRef (inherited from MarshalByRefObject) Creates an object that contains all the relevant information required to generate a proxy used to communicate with a remote object.

Discover Dynamically binds to an XML Web service described in the discovery document at Url.Dispose (inherited from Component) Overloaded. Releases the resources used by the Component.

GetHashCode (inherited from Object)Supported by the .NET Compact Framework. Serves as a hash function for a particular type, suitable for use in hashing algorithms and data structures like a hash table.GetLifetimeService (inherited from MarshalByRefObject) Retrieves the current lifetime service object that controls the lifetime policy for this instance.

GetType (inherited from Object)Supported by the .NET Compact Framework. Gets the type of the current instance.InitializeLifetimeService (inherited from MarshalByRefObject) Obtains a lifetime service object to control the lifetime policy for this instance.

ToString (inherited from Object)Supported by the .NET Compact Framework. Returns a String that represents the current Object.Public Events

Disposed (inherited from Component) Adds an event handler to listen to the Disposed event on the component.Protected PropertiesDesignMode (inherited from Component) Gets a value that indicates whether the object is currently in design mode.

Events (inherited from Component) Gets the list of event handlers that are attached to this Component.Protected MethodsBeginInvoke

Supported by the .NET Compact Framework. Starts an asynchronous invocation of an XML Web service method using SOAP.

Dispose (inherited from Component)Supported by the .NET Compact Framework. Overloaded. Releases the resources used by the Component.EndInvokeSupported by the .NET Compact Framework. Ends an asynchronous invocation of an XML Web service method using SOAP.

Finalize (inherited from Component)Supported by the .NET Compact Framework. Overridden. Releases unmanaged resources and performs other cleanup operations before the memoryis reclaimed by garbage collection.In C# and C++, finalizers are expressed using destructor syntax.GetService (inherited from Component) Returns an object that represents a service provided by the Component or by its Container.GetWebRequest

Supported by the .NET Compact Framework. Overridden. Creates a WebRequest instance for the specified url.

GetWebResponse (inherited from HttpWebClientProtocol)Supported by the .NET Compact Framework. Overloaded. Overridden. Returns a response from a request to an XML Web service method.Invoke

Supported by the .NET Compact Framework. Invokes an XML Web service method synchronously using SOAP.

MemberwiseClone (inherited from Object)Supported by the .NET Compact Framework. Creates a shallow copy of the current Object.

Webcams are those handy little cameras that attach to your PC and send images to a web page that can be viewed by others. This enables you to share daily life events with friends and family in other parts of the country or the world, or to arrange a video-conference with colleagues and maintain long distance relationships of all kinds. Of course the number of ways to use this technology is limited only by your imagination.

Web Cameras

But before you buy a webcam, it pays to understand a little about how the technology of broadcasting images over the Internet works. Of course, if you're a full bottle on this already, you can skip this section and go straight to browsing the options on Myshopping.com.au where you can compare products and suppliers, their specifications and prices.

Webcams provide 'real time' images of people; places and events that can be viewed 'live' on a web page. The broadcasting end has a camera that captures the images, feeds them into a computer to an ISP and out to viewing pages across the Internet. There are two different types of broadcast: streaming images, where the images are a constant stream downloaded in video format; or Java, where the images are captured at fixed time intervals and refreshed on the web pages at a rate fixed by the broadcaster.

The Applications - What are you intending to broadcast, and to whom?

There is a wide range of uses of webcam technology. Some examples include personal 'Big Brother' style diaries, sharing of family events, workplace security, video conferencing, virtual tourism, road traffic management, weather watching, event broadcast and a host of others.

Before you make a choice about any webcam equipment, it helps to decide exactly how you want to use the technology, in other words, what you are intending to broadcast. This decision will impact upon the type of camera you use, and how you use it.

A second consideration is, who will be viewing your content? What level of quality is expected? This will help determine the type of camera you use, the software involved and your Internet connection. Of course, your Internet connection may be a limitation on how much you can do.

The requirements for video conferencing are different from the requirements of workplace security, which are different again from the requirements of sharing a family event.

The physical components

There are a number of physical components required to make web cam technology work. At the top of the list is the camera itself. Then, depending on the type of camera you use and the way in which you want to deliver the content to the Internet, you may need to incorporate video capture hardware in your computer. Some software is required to help you process the data, and Internet connection is required and a web page into which the data is fed.

CAMERA CHOICES

Your choice of camera depends somewhat on what you are intending to show. If you need to reach a large public audience yo may want good quality camcorder or megapixel camera that captures high quality images. If it's just for seeing who's at your front door or keeping an eye on the kids in their playroom, then it may not need to present high quality images. If you are intending to use it outdoors, it will need to be weather proof and you may need to consider sun and UV protection. Available power supply and any robotic requirements for camera movement and focus are extra considerations.

Dedicated webcams

The most basic webcams connect to a PC using a simple USB connection. A wide range of cameras with accompanying software at a range of prices is available for this type of application. Simply search though Myshopping.com.au to compare prices and specifications. Dedicated webcams are simple to install and easy to use, but come with limitations that affect the quality of the images, such as low number of frames per second (refresh rates) and resolution (pixels per inch).

Camcorders and security cameras

Higher quality images and more camera control come from using camcorder and security cameras. To use these devices you will need to add a video capture card to your PC. Once you have that installed however, you can use a wide range of cameras from broadcast cameras to miniature spy cameras. You can include variable lens options, filters for daylight and low light situations, as well as robotic controls for panning and focus adjustments. You can search through Myshopping.com.au for camcorder selections.

Integrated cameras

An integrated camera combines the camera and the optical hardware with a video server, and as such requires no additional software. They can be used in network situations or as stand-alone devices for monitoring progress on a construction project for example.

Megapixel cameras

Network megapixel cameras combine network capability with high quality digital camera technology. These cameras offer excellent quality but this creates large files sizes, therefore they have limited application in constant streaming video. However for interval refreshed archive image collection, they are ideal, providing a constant record and high quality. You can search through Myshopping.com.au for digital camera selections.

SOFTWARE

If you are not using an integrated camera solution, you will need to install an encoding program like Webcaster or MediaCaster to transfer your images to a web page.

At the receiver end, when web surfers browse the internet and wish to view live video on the web for the first time, they will need to download dedicated applications that show the content such as an ActiveX control, Windows Media player, Flash player or the like.

INTERNET CONNECTION

Finally, you need an Internet connection. The hardware you will need may include a modem for dial-up connection, or modem/router for a broadband solution. Naturally the higher the quality you want, or the faster refresh rate you want, the more bandwidth you will need. ADSL (Broadband) is going to offer you the best solution, but keep in mind what your Internet connection when you are making choices of cameras and feeder software.

Webcam applications work well with wireless solutions. Make sure when you are purchasing a camera or network video solution that it is compatible with any wireless system you may be using in a LAN.

Key considerations

The specifications that are variable with webcam applications, and are affected by camera type, web interface and Internet connection, include the number of frames per second and the image resolution.

Frames-per-second is the number of times a still image flashes by in a second to give the appearance of moving pictures. In Australia, the standard television PAL format is at 25 frames per second. A webcam with up to 30 frames per second will show normal video images. But the more frames per second you demand, the more bandwidth, memory and processing power is required.

Resolution is measured the number of pixels per inch. High quality photographs require a high resolution. But the standard for web images is a low 72 dpi. Higher resolution images will not be of any better visual quality, just slower to upload and download.

Use Myshopping.com.au to compare different webcams, camcorders and digital cameras. You can compare the prices and specifications of the different products and brands, and a wide range of reputable vendors.

Whether you are just starting your first Java program, or you are a well experienced programmer, your code can not be an error free code and compile successfully from the first time. At the least you may confuse variable names, forget to declare a variable, or miss a semicolon.

Java language errors, just like all other programming languages, can be either syntax errors or logical errors. Syntax errors, also called compile time errors, are illegal use of statements in terms of programming language rules. When the compiler catches them it generates an error message indicating the class name, line number where the error is found, and the type of error. However, sometimes the actual error may not actually be in the line indicated in the message. You would want to look in and somewhere before these lines to locate the error.

This happens because syntax errors can be tricky sometimes; one error may lead to more than one error message. A missing semicolon for example causes the following one or more lines to be invalid, and thus generates error messages for all of them. Once you fix that error, all following messages will be cleared.

When writing a program with Java, syntax errors are almost unavoidable, so do not panic or get disappointed when you encounter them. Some of these errors are very common and you are very likely to encounter one or more of them when compiling your code. The fact is, you cannot avoid them. So the best way to deal with them is to get yourself familiar with them and know how to fix them. Below are some of the most common errors along with their solutions.

Capitalization Errors: Java language is case sensitive, variable names must be exactly the same, Total is not the same as total and not the same as toTal.

The file name is different than the public class name: The class should be saved in a file with exactly the same name; a Shirt class should be saved in a file named Shirt.java. Saving it to a different file name will give a compiling error.

Javac cannot find the class: When you save your classes, or source codes, they have to be in the very same directory where your javac.exe is. This file is responsible for compiling your codes and is created automatically when you download and successfully install the DSK machine. Generally you would install the SDK into your C:\ drive so there where your javac file will reside. Thus when saving your source code you need to save it in the C:\ directory in a folder named java.

"javac is not recognized as an internal or external command, operable program or batch file" (for Windows System) or "javac: Command not found" (for UNIX System): This means that your compiler cannot find your javac. This is due to one of two reasons, either you do not have a javac at all because you did not install the correct machine, or you did not set your PATH correctly. In this case you need to properly set your PATH, or you will have to type in the full file name path to execute it.

"Line nn: ';' expected": This means you moved to a new line without signaling to the compiler. When your string, or code line, is too long to fit in one line, you may want to split into two lines. Doing that just by pressing the Enter key will confuse the compiler and generate an error. Instead you will need to concatenate with a '+' sign. That is split your string into two lines, ending the first with a '+' before moving to the second line.